AWS JIT Permissions Crew
Last updated
Was this helpful?
Last updated
Was this helpful?
Streamline your AWS access management and implement a culture of least-privileged access and zero trust.
Whether it's access to production, staging, an S3 bucket or any other AWS resources, allow developers to get the permissions they need on a just-in-time, as-needed basis.
From permissions request, to policy review and decision-making, and alerts – your entire flow for elevated access can be handled within Slack.
Allow developers to simply say what they need, and have your AI Teammates worry about creating formal requests.
When TTL expires, AI Teammates will automatically revoke the permissions and alert you so that you're in the loop.
Kubiya provides you a log of all requests, decisions, permissions granted and revoked for you, your security and compliance teams.
(local or hosted) with the
(the Kubiya Slack app)
(permissions approvers should be in this channel)
An OPA policy written in REGO language, stored in GitHub, GitLab, or Bitbucket
Your org's Okta client ID and a private key for Okta authentication
Select AWS IAM JITSec and click Continue
Follow the on-screen instructions
If you haven't created a runner yet, no problem. In the Select Runner drop-down, choose Create a Runner and follow the on-screen instructions.
Make sure the Slack channel you provide is one in which the Kubiya Slack app has been added and has the permissions approvers as members of it
Config JSON - Here you should define the specific AWS resources that you want to provide your developers the ability to request access to
Click Save and Continue. Behind the scenes this is running Terraform Plan
.
If the plan is successful, you'll be brought to a screen showing a summary of the resources that will be created. To finish setup, click Delegate. This will run a Terraform Apply
.
Refresh the screen and check that the use case's status is Active
. If so, then the Terraform Apply was successful and you are ready to use your use case.
Now that you've set up the AWS JIT Permissions Crew, your developers in your organization can easily request permissions. To do so, they should simply go to the Kubi Jr. app in Slack and describe what they want.
Once a permissions request has been made, the approvers Slack channel will be notified of the request and its details, giving them the ability approve or reject from within Slack.
The requestor will receive a notification as to the decision regarding their request. If approved, then the permissions will be revoked once TLL expires and all parties notified.
Go to the
For a full breakdown of setting it up, see our .
For this use case, Kubiya requires specific permissions in your AWS. To do so, make sure that your Kubiya includes all of the necessary permission sets in order to grant and revoke all of the necessary permissions on all of the AWS resources you defined in the Config JSON file.